APT Attack Detection Based on Graph Convolutional Neural Networks

被引:0
|
作者
Weiwu Ren
Xintong Song
Yu Hong
Ying Lei
Jinyu Yao
Yazhou Du
Wenjuan Li
机构
[1] Changchun University of Science and Technology,School of Computer Science and Technology
[2] National Computer Network Emergency Response Center,Jilin Branch
关键词
APT attack detection; Graph convolutional neural networks; Knowledge graph; Vulnerability exploits;
D O I
暂无
中图分类号
学科分类号
摘要
Advanced persistent threat (APT) attacks are malicious and targeted forms of cyberattacks that pose significant challenges to the information security of governments and enterprises. Traditional detection methods struggle to extract long-term relationships within these attacks effectively. This paper proposes an APT attack detection model based on graph convolutional neural networks (GCNs) to address this issue. The aim is to detect known attacks based on vulnerabilities and attack contexts. We extract organization-vulnerability relationships from publicly available APT threat intelligence, along with the names and relationships of software security entities from CVE, CWE, and CAPEC, to generate triple data and construct a knowledge graph of APT attack behaviors. This knowledge graph is transformed into a homogeneous graph, and GCNs are employed to process graph features, enabling effective APT attack detection. We evaluate the proposed method on the dataset constructed in this paper. The results show that the detection accuracy of the GCN method reaches 95.9%, improving by approximately 2.1% compared to the GraphSage method. This approach proves to be effective in real-world APT attack detection scenarios.
引用
收藏
相关论文
共 50 条
  • [11] GCNXSS: An Attack Detection Approach for Cross-Site Scripting Based on Graph Convolutional Networks
    Pan, Hongyu
    Fang, Yong
    Huang, Cheng
    Guo, Wenbo
    Wan, Xuelin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2022, 16 (12) : 4008 - 4023
  • [12] Convolutional Graph Neural Networks
    Gama, Fernando
    Marques, Antonio G.
    Leus, Geert
    Ribeiro, Alejandro
    CONFERENCE RECORD OF THE 2019 FIFTY-THIRD ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, 2019, : 452 - 456
  • [13] The Optimized Attribute Attack Graph Based on APT Attack Stage Model
    Li, Meicong
    Huang, Wei
    Wang, Yongbin
    Fan, Wenqing
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 2781 - 2785
  • [14] Polynomial-based graph convolutional neural networks for graph classification
    Luca Pasa
    Nicolò Navarin
    Alessandro Sperduti
    Machine Learning, 2022, 111 : 1205 - 1237
  • [15] Polynomial-based graph convolutional neural networks for graph classification
    Pasa, Luca
    Navarin, Nicolo
    Sperduti, Alessandro
    MACHINE LEARNING, 2022, 111 (04) : 1205 - 1237
  • [16] Blockchain cryptocurrency abnormal behavior detection based on improved graph convolutional neural networks
    Li, Xiaohan
    Yang, Yanbo
    Li, Baoshan
    Li, Minchao
    Zhang, Jiawei
    Li, Teng
    2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 216 - 222
  • [17] Partial directed coherence based graph convolutional neural networks for driving fatigue detection
    Zhang, Weiwei
    Wang, Fei
    Wu, Shichao
    Xu, Zongfeng
    Ping, Jingyu
    Jiang, Yang
    REVIEW OF SCIENTIFIC INSTRUMENTS, 2020, 91 (07):
  • [18] Defect detection in cardiac SPECT using graph-based convolutional neural networks
    Spier, Nathalia
    Christoph, Rischpler
    Rupprecht, Christian
    Navab, Nassir
    Baust, Maximilian
    Nekolla, Stephan
    JOURNAL OF NUCLEAR MEDICINE, 2018, 59
  • [19] Network Attack Identification and Analysis Based on Graph Convolutional Neural Network
    Wang, Xingyu
    Wenkun
    Zhang, Yingdan
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1443 - 1448
  • [20] AIGCN: Attack Intention Detection for Power System Using Graph Convolutional Networks
    Qiuhang Tang
    Huadong Chen
    Binbin Ge
    Haoyu Wang
    Journal of Signal Processing Systems, 2022, 94 : 1119 - 1127